VB2014 preview: Tech Support Scams 2.0: an inside look into the evolution of the classic Microsoft tech support scam

Posted by   Virus Bulletin on   Sep 22, 2014

Jérôme Segura looks at recent developments in malicious cold calls.

In the weeks running up to VB2014 (the 24th Virus Bulletin International Conference), we are looking at some of the research that will be presented at the event. Today, in the final entry in this series, we look at the paper 'Tech Support Scams 2.0: an inside look into the evolution of the classic Microsoft tech support scam' , by Jérôme Segura (Malwarebytes).

Two years ago, at VB2012 in Dallas, I co-presented a paper on tech support scams. Somewhat naively, I expected the scams to die out before too long: soon, enough people would know not to trust people calling about computer issues that the scam would stop being profitable to the scammers.

I couldn't have been more wrong, and no one knows this better than Jérôme: on the Malwarebytes blog, he has written many posts about his adventures with support scammers. Adventures which tend to be quite hilarious - until one realises that real people continue to fall victim to such scams.

In his paper, Jérôme explains how the scam has evolved: not only do many callers no longer claim they are calling on behalf of Microsoft, they have also broadened their scope, and apart from Windows are now also targeting Mac and Android users.

Scammers continue to find inventive ways to 'prove' something is wrong with the victim's computer or device, such as a failing ping to protection.com (a domain that doesn't accept ICMP requests) or the 'ESTABLISHED' shown by the netstat command as a proof that bad guys are currently and actively stealing all your information.

  Netflix phishing page leading to support scams. Source: Malwarebytes.

In one instance, the scammers used a Netflix phishing page which gave a login error (but allowed the crooks to steal the credentials) and urged the victim to call a phone number, upon which they would be told that their computer had been hacked - something that could only be fixed after paying a hefty fee.

Support scams continue to evolve, and in his presentation, Jérôme will talk about a number of recent developments that occurred after he submitted the paper. These include scammers claiming to be the official support technicians of various security products (something that no doubt will be of interest to many attendees), as well as further evidence of scams operating from within the US itself.

  Scareware leading to support scams. Source: Malwarebytes.

The paper finishes with a number of useful suggestions for those who, like Jérôme, want to gather intelligence on support scammers. Many will not want to go as far as the Metasploit researcher who released a zero-day exploit in Ammyy, a remote access tool popular among scammers, with the purpose of 'fighting back'. However, there are other, less ethically dubious ways to gather intelligence on these scams and the tactics used; they will help prevent people from falling victim.

VB2014 takes place next week in Seattle. Registration for VB2014 is still possible.

Posted on 22 September 2014 by Martijn Grooten



Latest posts:

VB2019 call for papers - now open!

Have you analysed a new online threat? Do you know a new way to defend against such threats? Are you tasked with securing systems and fending off attacks? The call for papers for VB2019 is now open and we want to hear from you!

VB2018 paper: Unpacking the packed unpacker: reversing an Android anti-analysis library

Today, we publish a VB2018 paper by Google researcher Maddie Stone in which she looks at one of the most interesting anti-analysis native libraries in the Android ecosystem. We also release the recording of Maddie's presentation.

VB2018 paper: Draw me like one of your French APTs – expanding our descriptive palette for cyber threat actors

Today, we publish the VB2018 paper by Chronicle researcher Juan Andres Guerrero-Saade, who argues we should change the way we talk about APT actors.

Book Review: Cyber Wars

VB Editor Martijn Grooten reviews Charles Arthur's Cyber Wars, which looks at seven prominent hacks and attacks, and the lessons we can learn from them.

VB2018 paper: Office bugs on the rise

At VB2018 Sophos researcher Gábor Szappanos provided a detailed overview of Office exploit builders, and looked in particular at the widely exploited CVE-2017-0199. Today we publish his paper and release the video of his presentation.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.